@AiDz0r here is the base concept: what happens is you browse through port 80 and karmetasploit sets up a server for bruteforcing exploits on port 80 so now that thats set up all you have to do is get him to connect to you on port 80 so you create a honeypot (a network that appears to be his but is really your own trap) after he connects to you thinking he is on his own home network decides to load up internet explorer which is on port 80, and karmetasploit goes to work.